Error message

Monday, 28 April 2025
Time Speaker Title Resources
09:30 to 10:30 Swastik Kopparty (University of Toronto, Toronto, Canada) Lectures on Coding Theory (Lecture 1)
11:00 to 12:00 Mrinal Kumar (Tata Institute of Fundamental Research, Mumbai, India) Lectures on Coding Theory (Lecture 2)
14:00 to 15:00 Madhur Tulsiani (Toyota Technological Institute, Chicago, USA) Lectures of High-dimensional expanders (Lecture 1)
15:30 to 16:30 Madhur Tulsiani (Toyota Technological Institute, Chicago, USA) Lectures of High-dimensional expanders (Lecture 2)
Tuesday, 29 April 2025
Time Speaker Title Resources
09:30 to 10:30 Swastik Kopparty (University of Toronto, Toronto, Canada) Lectures on Coding Theory (Lecture 3)
11:00 to 12:00 Mrinal Kumar (Tata Institute of Fundamental Research, Mumbai, India) Lectures on Coding Theory (Lecture 4)
14:00 to 15:00 Max Hopkins (University of California, San Diego, USA) Lectures of High-dimensional expanders (Lecture 3)
15:30 to 16:30 Max Hopkins (University of California, San Diego, USA) Lectures of High-dimensional expanders (Lecture 4)
Wednesday, 30 April 2025
Time Speaker Title Resources
09:30 to 10:30 Swastik Kopparty (University of Toronto, Toronto, Canada) Lectures on Coding Theory (Lecture 5)
11:00 to 12:00 Mrinal Kumar (Tata Institute of Fundamental Research, Mumbai, India) Lectures on Coding Theory (Lecture 6)
14:00 to 15:00 Max Hopkins (University of California, San Diego, USA) Lectures of High-dimensional expanders (Lecture 5)
15:30 to 16:30 Max Hopkins (University of California, San Diego, USA) Lectures of High-dimensional expanders (Lecture 6)
Thursday, 01 May 2025
Time Speaker Title Resources
09:30 to 10:30 Swastik Kopparty (University of Toronto, Toronto, Canada) Lectures on Coding Theory (Lecture 7)
11:00 to 12:00 Mrinal Kumar (Tata Institute of Fundamental Research, Mumbai, India) Lectures on Coding Theory (Lecture 8)
14:00 to 15:00 Pavel Panteleev (Moscow State University) Lectures on Chain Complexes and Codes (Lecture 1)
15:30 to 16:30 Pavel Panteleev (Moscow State University, Moscow, Russia) Lectures on Chain Complexes and Codes (Lecture 2)
Friday, 02 May 2025
Time Speaker Title Resources
09:30 to 10:30 Madhur Tulsiani (Toyota Technological Institute, Chicago, USA) Lectures of High-dimensional expanders (Lecture 7)
11:00 to 12:00 Madhur Tulsiani (Toyota Technological Institute, Chicago, USA) Lectures of High-dimensional expanders (Lecture 8)
14:00 to 15:00 Pavel Panteleev (Moscow State University, Moscow, Russia) Lectures on Chain Complexes and Codes (Lecture 3)
15:30 to 16:30 Pavel Panteleev (Moscow State University, Moscow, Russia) Lectures on Chain Complexes and Codes (Lecture 4)
Monday, 05 May 2025
Time Speaker Title Resources
09:30 to 10:00 Madhur Tulsiani (Toyota Technological Institute, Chicago, USA) Expander graphs and optimally list-decodable codes

We construct a new family of explicit codes that are list decodable to capacity and achieve an optimal list size of O(1/ϵ). In contrast to existing explicit constructions of codes achieving list decoding capacity, our arguments do not rely on algebraic structure but utilize simple combinatorial properties of expander graphs.

Our construction is based on a celebrated distance amplification procedure due to Alon, Edmonds, and Luby [FOCS'95], which transforms any high-rate code into one with near-optimal rate-distance tradeoff. We generalize it to show that the same procedure can be used to transform any high-rate code into one that achieves list decoding capacity. Our proof can be interpreted as a "local-to-global" phenomenon for (a slight strengthening of) the generalized Singleton bound.

As a corollary of our result, we also obtain the first explicit construction of LDPC codes achieving list decoding capacity, and in fact arbitrarily close to the generalized Singleton bound.

Based on joint work with Fernando Granha Jeronimo, Tushant Mittal, and Shashank Srivastava.

10:00 to 10:40 Shashank Srivastava List Decoding Expander-Based Codes up to Capacity in Near-Linear Time

We will talk about a new framework based on graph regularity lemmas, for list decoding and list recovery of codes based on spectral expanders. These constructions often proceed by showing that the distance of local constant-sized codes can be lifted to a distance lower bound for the global code. The regularity framework allows us to similarly lift list size bounds for local base codes, to list size bounds for the global codes.

This allows us to obtain novel combinatorial bounds for list decoding and list recovery up to optimal radius, for Tanner codes of Sipser and Spielman, and for the distance amplification scheme of Alon, Edmonds, and Luby. Further, using existing algorithms for computing weak-regularity decompositions of sparse graphs in (randomized) near-linear time, these tasks can be performed in near-linear time.

Based on joint work with Madhur Tulsiani.
DIMACS (Rutgers University) and Institute for Advanced 

11:10 to 11:55 Pravesh Kothari Hypergraph Rainbow Problems, Kikuchi Matrices, and Local Codes

The classical rainbow cycle conjecture of Keevash, Mubayi, Verstrate, and Sudakov says that every properly edge-colored graph of average degree \Omega(log n) contains a "rainbow" cycle, i.e., a cycle with edges of all distinct colors. Recent advances have almost resolved this conjecture up to an additional log log n factor.  

In this talk, I will describe hypergraph variants of the graph rainbow problem and show how they are intimately related to the existence of (linear) locally decodable and locally correctable codes. 
I will then describe the "Kikuchi Matrix Method" to solve such problems - a general principle that converts hypergraph rainbow problems into related graph counterparts. Consequently, we obtain an exponential lower bound on linear 3 query locally correctable codes, a cubic lower bound on 3 query locally decodable codes (LDCs) and more generally, $k^{q/(q-2)}$ lower bound for all $q$-query LDCs. The case of even $q$ was known since 2004, but the best known bounds for odd q$ were obtained by treating a $q$ query code as a $q+1$ query code instead. 

For those familiar with the work in this area, this will be a combinatorial viewpoint on the spectral methods that yield similar results when the code is restricted to be linear. 

Based on joint works with Omar Alrabiah, Arpon Basu, David Munha-Correia, Venkat Guruswami, Tim Hsieh, Peter Manohar, Sidhanth Mohanty, Andrew Lin, and Benny Sudakov

12:00 to 12:30 Lalitha Vadlamani (International Institute of Information Technology, Hyderabad) An Analysis of RPA Decoding of Reed-Muller Codes Over the BSC

In this talk, we consider the Recursive Projection-Aggregation (RPA) decoder, of Ye and Abbe (2020), for Reed-Muller (RM) codes. Our main contribution is an explicit upper bound on the probability of incorrect decoding, using the RPA decoder, over a binary symmetric channel (BSC). Importantly, we focus on the events where a single iteration of the RPA decoder, in each recursive call, is sufficient for convergence. Key components of our analysis are explicit estimates of the probability of incorrect decoding of first-order RM codes using a maximum likelihood (ML) decoder, and estimates of the error probabilities during the aggregation phase of the RPA decoder. Our results allow us to show that for RM codes with blocklength $N = 2^m$, the RPA decoder can achieve vanishing error probabilities, in the large blocklength limit, for RM orders that grow roughly logarithmically in $m$.

14:15 to 15:00 Max Hopkins (University of California, San Diego, USA) Concentration on HDX: Derandomization Beyond Chernoff

Chernoff's bound states that for any $A \subset [N]$ the probability a random $k$-tuple $s \in {[N] \choose k}$ correctly `samples' $A$ (i.e. that the density of $A$ in $s$ is close to its mean) decays exponentially in the dimension $k$. In 1987, Ajtai, Komlos, and Szemeredi proved the "Expander-Chernoff Theorem", a powerful derandomization of Chernoff's bound stating that one can replace ${[N] \choose k}$ with the significantly sparser family $X_G(k) \subsetneq {[N] \choose k}$ of length-$k$ paths on an expander graph $G$ while maintaining essentially the same concentration. Their result, which allows amplification without significant blow-up in size or randomness, has since become a mainstay in theoretical computer science with breakthrough applications in derandomization, coding, pseudorandomness, cryptography, and complexity.

One natural way to view AKS is to say Expander-Walks are pseudorandom with respect to functions of their vertices, or against "degree 1" functions. In modern complexity, especially in the context of hardness amplification and PCPs, we often need concentration against higher degree functions, e.g. functions of edges or triples. Unfortunately, due to their inherent low-dimensionality, walks on expanders are not pseudorandom even at degree 2, and the construction of such a de-randomized object has remained largely open. 

In 2017 Dinur and Kaufman offered a partial resolution to this question in high dimensional expanders, a derandomized family satisfying Chebyshev-type (inverse polynomial) concentration for higher degree functions. Their work led to breakthrough applications in agreement testing and PCPs (Bafna, Minzer, Vyas, and Yun STOC 2025), but left an exponential gap with known bounds for the complete hypergraph ${[N] \choose k}$ needed for further applications. In this talk, we close this gap and prove (strong enough) HDX indeed have Chernoff-type tails. Time willing, we will discuss the relation of these bounds to a powerful analytic inequality called reverse hypercontractivity and its applications to agreement tests with optimal soundness.

Based on joint work with Yotam Dikstein.
 

15:30 to 16:00 Gilles Zémor (Université de Bordeaux, Bordeaux, France) Kneser's theorem for codes and $\ell$-divisible set families

A k-wise m-divisible set family is a collection F of subsets of {1,...,n} such that any intersection of k sets in F has cardinality divisible by m. If k=m=2, it is well-known that |F| <= 2^{[n/2]}. We generalise this by proving that |F| <= 2^{[n/p]} if k=m=p, for any prime number p.
For arbitrary values of m, we prove that (4m^2)-wise m-divisible setfamilies F satisfy |F| <= 2^{[n/m]} and that the only families achieving the upper bound are atomic, meaning that they consist of all the unions of disjoints subsets of size m. This improves upon a recent result by Gishboliner, Sudakov and Timon, that arrived at the same conclusion for k-wise m-divisible families, with values of k that behave exponentially in m.
Our techniques rely heavily upon a coding-theory analogue of Kneser's Theorem from additive combinatorics.
Joint work with Chenying Lin.
 

16:00 to 16:30 Swastik Kopparty (University of Toronto, Toronto, Canada) GAP codes

GAP codes are error-correcting codes based on evaluating degree-d m-variate polynomials at some
geometrically arranged points in F_q^m. For m constant and any epsilon > 0, these codes can achieve rate 1-epsilon and distance Omega(1).
For Reed-Muller codes, where the evaluation points form all of F_q^m, the rate is is exponentially small in $m$.

GAP codes turn out to have a a very simple description from the point of view of HDXs: they are Tanner codes on the complete $m$-dimensional complex with Reed-Solomon codes as the inner code.

I will talk about their construction, how to decode them, and the somewhat surprising fact that despite having much fewer evaluation points than Reed-Muller codes, GAP codes are also locally testable with O(n^{1/m}) queries.

Joint work with Harry Sha and Mrinal Kumar
(Based on part of this paper: https://arxiv.org/abs/2410.13470 )

17:00 to 17:30 Mitali Bafna (Massachusetts Institute of Technology, Cambridge, USA) Efficient PCPs from HDX

The theory of probabilistically checkable proofs (PCPs) shows how to encode a proof for any theorem into a format where the theorem's correctness can be verified by making only a constant number of queries to the proof. The PCP Theorem [ALMSS] is a fundamental result in computer science with far-reaching consequences in hardness of approximation, cryptography, and cloud computing. A PCP has two important parameters: 1) the size of the encoding, and 2) soundness, which is the probability that the verifier accepts an incorrect proof, both of which we wish to minimize. In 2005, Dinur gave a surprisingly elementary and purely combinatorial proof of the PCP theorem that relies only on tools such as graph expansion, while also giving the first construction of 2-query PCPs with quasi-linear size and constant soundness (close to 1). Our work improves upon Dinur's PCP and constructs 2-query, quasi-linear size PCPs with arbitrarily small constant soundness. As a direct consequence, assuming the exponential time hypothesis, we get that no approximation algorithm for 3-SAT can achieve an approximation ratio significantly better than 7/8 in time 2^{n/polylog n}. In this talk, I will introduce PCPs and discuss the components that go into our proof. This talk is based on joint work with Dor Minzer and Nikhil Vyas, with an appendix by Zhiwei Yun.

Tuesday, 06 May 2025
Time Speaker Title Resources
09:30 to 10:00 David Lin (UC San Diego, San Diego, USA) Sheaf codes, cup products, and quantum LDPC codes with transversal non-Clifford gates.
10:10 to 10:40 Pavel Panteleev (Moscow State University, Moscow, Russia) Coboundary Expansion of Tensor Product Codes over Large Fields

The coboundary expansion property of tensor product codes, also known as product expansion, plays an important role in the discovery of good quantum LDPC codes and classical locally testable codes. Prior research has shown that this property is equivalent to agreement testability and robust testability for products of two codes with linear distance. However, for products of more than two codes, it is a strictly stronger property.

In this talk, I will outline key ideas underlying a recent result establishing that tensor products of an arbitrary number of random codes over sufficiently large fields exhibit strong coboundary expansion. This result suggests promising directions for new quantum locally testable code constructions.

11:10 to 11:55 Venkat Guruswami Good Quantum Codes via Tensor Products

A central challenge in quantum computing is to efficiently perform computations in a fault-tolerant manner. Schemes for fault-tolerance rely on quantum error-correcting codes that possess two key features: (1) low-weight stabilizers (i.e., lightweight parity checks) and (2) transversal non-Clifford gates, which provide the algebraic structure needed for universal computation. However, achieving these properties has proven difficult. In fact, the first asymptotically good codes satisfying either (1) or (2) individually were constructed only recently. Asymptotically good codes achieving both properties simultaneously—potentially enabling new, more efficient, and resilient fault-tolerance protocols—have remained elusive.

In this talk, we present new code constructions that make progress on this challenge. Specifically, we construct the first known asymptotically good quantum codes with sublinear-weight checks that also support transversal non-Clifford gates. In addition, our work gives the first (nearly) asymptotically good codes with subpolynomial-weight checks that do not rely on the lifted/balanced product operation of previous constructions. Instead, our approach is based on the simpler and more elementary tensor product.

Based on joint work with Louis Golowich.

12:00 to 12:30 Roy Meshulam (Technion – Israel Institute of Technology, Haifa , Israel) Homology and Expansion of Random Complexes

In recent years there is a growing interest in higher dimensional random complexes, both as natural extensions of random graphs, and as potential tools for new applications, e.g. to higher dimensional expanders. We will focus on two models of random complexes and their generic topological properties:

1. A classical theorem of Alon and Roichman asserts that the Cayley graph C(G,S) of a group G with respect to a logarithmic size random subset S of G is a good expander. We consider a k-dimensional analogue of Cayley graphs, called Balanced Cayley Complexes, discuss the spectral gap of their (k-1)-Laplacian and in particular obtain a high dimensional version of the Alon-Roichman theorem.

2. A permutation complex is the order complex of the intersection of two linear orders. We describe some properties of these complexes and discuss bounds on the probability that a permutation complex associated with random orders is topologically k-connected.
Joint work with Omer Moyal.

14:00 to 15:00 Ashutosh Shankar, Arka Ray, Rohit Yadav, Amalok Kalra Lightning Talks
15:30 to 16:00 Shubhangi Saraf (University of Toronto, Toronto, Canada) Proximity Gaps for Reed-Solomon Codes

I will talk about proximity gaps for Reed-Solomon codes. In particular we will discuss questions of the following kind: How many points of an affine space can be "close" in Hamming distance to the Reed-Solomon code?

We will see how to use an understanding of this, to effectively analyze interactive protocols for testing if a given function is close to a Reed-Solomon Codeword.

16:00 to 16:30 Nicolas Resch (University of Amsterdam, Amsterdam, Netherlands) Efficient Cryptographic Proofs from RAA Codes

In this talk, we will introduce interactive oracle proofs (IOPs), which are an interactive generalization of probabilistically-checkable proofs (PCPs). IOPs can then be “compiled” into very efficient cryptographic proofs, which can be very short (say, polylogarithmic length) and admit very efficient verifiers (say, polylogarithmic time). One requirement that arises from practice is that the prover also be very efficient; ideally, running in linear time.

After introducing these concepts, I will outline how one can use error-correcting codes with efficient encoding algorithms to design efficient cryptographic proofs. We will then discuss Repeat-Accumulate-Accumulate (RAA) codes, which are a simple class of turbo codes offering extremely efficient encoding and near-GV bound minimum distance. We will spend a good portion of this presentation describing these codes, discussing the challenges which arise in their analysis, and surveying some open problems.

17:00 to 17:30 Sourav Chakraborty (Indian Statistical Institute, Kolkata, India) Testing of Codes in the Huge Object Model.
Wednesday, 07 May 2025
Time Speaker Title Resources
09:30 to 10:00 Siqi Liu Locally Testable Codes with the Multiplication Property from High-dimensional Expanders

Expanders are well-connected graphs that have been extensively studied and have numerous applications in computer science, including error-correcting codes. High-dimensional expanders (HDXs) generalize expanders to hypergraphs and have the powerful local-to-global property. Roughly speaking, this property states that the expansion of an HDX can be certified by the expansion of certain local structures. This property has made HDXs crucial in the recent breakthrough on locally testable codes (LTCs) [Dinur et al.'22]. These LTCs simultaneously achieve constant rate, constant relative distance, and constant query complexity. However, despite these desirable properties, these LTCs have yet to find applications in proof systems, as they lack the crucial multiplication property present in widely used polynomial codes. A major open question is: Do there exist LTCs with the multiplication property that achieve the same rate, distance, and query complexity as those constructed by Dinur et al.?

In this talk, I will provide intuition behind the connection between HDXs and LTCs, explain why the LTCs by Dinur et al. lack the multiplication property, and discuss my recent and ongoing work on constructing LTCs with the multiplication property. This talk is based on joint work with Irit Dinur, Huy Tuan Pham, and Rachel Zhang.

10:10 to 10:40 Shashank Srivastava (Institute for Advanced Study, Princeton, New Jersey, USA) Recent Improvements in list-size bounds of FRS codes
10:10 to 10:40 Tushant Mittal (Stanford University, Stanford, USA) A General Framework for Low Soundness Homomorphism Testing

In this talk, we will look at a general framework to design and analyze algorithms for the problem of testing homomorphisms between finite groups in the low-soundness regime.

Based on an upcoming joint work with Sourya Roy, University of Iowa.

12:00 to 12:30 Mrinal Kumar (Tata Institute of Fundamental Research, Mumbai, India) Fast list decoding of univariate multiplicity codes

TBD

Thursday, 08 May 2025
Time Speaker Title Resources
09:05 to 09:30 Prahladh Harsha (Tata Institute of Fundamental Research, Mumbai, India) The cost of communication
09:30 to 09:55 Nathan Linial (Hebrew University of Jerusalem) The roads taken

Paraphrasing the title of Riemann’s famous lecture of 1854 I ask: What is the most rudimentary notion of a geometry? A possible answer is a path system: Consider a finite set of “points” x_1,…,x_n and provide a recipe how to walk between x_i and x_j for all i\neq j, namely decide on a path P_ij, i.e., a sequence of points that starts at x_i and ends at x_j, where P_ji is P_ij, in reverse order. The main property that we consider is consistency. A path system is called consistent if it is closed under taking subpaths. What do such systems look like? How to generate all of them? We still do not know. One way to generate a consistent path system is to associate a positive number w_ij>0 with every pair and let P_ij be the corresponding w-shortest path between x_i and x_j. Such a path system is called metrical. It turns out that the class of consistent path systems is way richer than the metrical ones. My main emphasis in this lecture is on what we don’t know and wish to know, yet there is already a considerable body of work that we have done on the subject. The new results that I will present are joint with my student Daniel Cizma as well as with him and with Maria Chudnovsky

09:55 to 10:20 Meena Mahajan (The Institute of Mathematical Sciences) Semi-Algebraic Proof Systems for QBF

We introduce new semi algebraic proof systems for Quantified Boolean Formulas (QBF) analogous to the propositional systems Nullstellensatz, Sherali-Adams and Sum-of-Squares. We show how to transfer to this setting techniques both from the QBF literature (strategy extraction) and from propositional proof complexity (size degree relations and pseudo-expectation). We obtain a number of strong QBF lower bounds and separations between these systems, even when disregarding propositional hardness. This is recent joint work with Olaf Beyersdorff, Ilario Bonacina, Kaspar Kasche, and Luc Spachmann.

10:20 to 10:45 Mohit Garg (Indian Institute of Science, Bengaluru, India) On the Bit-Probe Complexity of the Set Membership Problem

We consider the fundamental trade-off between the compactness of information representation and the efficiency of information extraction in the context of the set membership problem. In this problem, a set S of size at most n, drawn from a universe of size m, is to be represented as a short bit vector to answer membership queries of the form “Is x in S?” by probing the bit vector at t positions. The bit-probe complexity s(m, n, t) denotes the minimum number of bits of storage needed for such a scheme. We are interested in determining the value of s(m, n, t). Over the past two and a half decades, Jaikumar has made foundational contributions that have shaped much of the work in this area. In this talk, we focus on the two-probe case (t = 2), where, in joint work with Jaikumar, we improve upon a result of Alon and Feige (2009) to obtain fairly tight upper and lower bounds on s(m, n, t=2). Interestingly, both the upper and lower bounds rely on combinatorial analyses involving graphs of large girth.

11:15 to 11:40 Ehud Friedgut (Weizmann Institute of Science, Rehovot, Israel) Stability of isoperimetric inequalities via entropy

The famous Lumis-Whitney Inequality, (and/or the Bollobas-Thomason Box Inequality) that bounds the volume of a body in terms of the volumes of its projections, is tight when the body in question is a box. Is it true that if it’s close to being tight then the body is close to being a box?
As this audience probably knows, Lumis and Whitney’s original proof was by induction on the dimension, which is the “wrong” way to go about it - Jaikumar’s approach, using entropy, gives the Book Proof. In this talk we show how his approach lays the foundation for a stability (robustness ) version of the inequality.
Joint work with David Ellis, Guy Kindler and Amir Yehudayoff.

11:40 to 12:05 Chandra Nair (Chinese University of Hong Kong, Hong Kong, China) An information inequality and its consequences

We present an inequality relating linear combinations of mutual information between subsets of mutually independent random variables and an auxiliary random variable (in the spirit of Shearer’s Lemma or Han’s inequality). By suitable choices of the auxiliary random variable, one can use this to obtain several previously known results as consequences: a) A generalized Stam’s inequality that implies the monotonicity of the entropy power b) Strong data-processing constants between sums of i.i.d. random variables c) Rusza-type sub-modular inequalities on sums of independent random variables defined on finite Abelian groups.

12:05 to 12:30 Marco Dalai (University of Brescia, Brescia, Italy) Bounds on linear k-hash codes

Recent upper bounds on the rate of linear trifferent codes are re-derived with a simple method first presented by Calderbank et al. in 1993, which also allows an extension to higher alphabet cardinality and to bounds on the hash-distance of linear codes, improving some results of Bassalygo et al. Some open problems are presented for a similar setting in list-decoding for certain discrete memoryless channels.

14:00 to 14:25 Omer Reingold (Stanford University) The importance of lower bounds: from Radhakrishnan-Ta-Shama and Beyond

Randomness extractors take a short truly random seed and use it to extract a longer, almost uniform, string from a weak source that has k bits of (min) entropy. How short can the short random seed be? It is not hard to show that it has to be Omega(log (n/eps)), where n is the number of bits of the weak source and eps is an error parameter. Good enough right? I would say it is, but Jaikumar Radhakrishnan and Amnon Ta-Shama showed it is log (n-k) + 2log(1/eps)-O(1) and this is tight up to the additive constant in the sense that a random graph with these parameters is an extractor. As a belated thanks I am going to explain the role this result has played in the zig-zag construction of extractors, leading to zig-zag expanders, SL=L (among other results), yada yada yada, a position in Stanford, multicalibration and its applications.

14:25 to 14:50 Amnon TaShma (Tel Aviv University, Tel Aviv, Israel) Extractors and Their Relatives – 30 Years Later

We revisit the longstanding challenge of establishing tight bounds—both explicit and non-explicit—for extractors and related combinatorial objects. This survey highlights key breakthroughs from the past three decades, marks significant milestones, and explores compelling open problems that continue to drive research in the field.

14:50 to 15:15 Vivek Shripad Borkar (Indian Institute of Technology, Bombay, India) Model Collapse In Recursive Training

I shall present a mathematical basis for the model collapse phenomenon observed in recursive training of neural networks.

15:45 to 16:10 Swastik Kopparty (University of Toronto, Toronto, Canada) Extracting Mergers and Small Shadow Partitions of [0,1]^n

Motivated by questions about randomness extraction, we study the problem of partitioning the unit cube [0,1]^n into c parts so that each d-dimensional axis-parallel projection has small volume. We answer a few questions and we don't answer many.

Based on joint works with Vishvajeet N and Harry Sha

16:10 to 16:35 Ravi Boppana (Massachusetts Institute of Technology) Tomaszewski's Problem on Randomly Signed Sums

Let $v_1$, $v_2$, ..., $v_n$ be real numbers whose squares add up to 1.  Consider the $2^n$ signed sums of the form $S = \sum \pm v_i$.  In 1986, Boguslav Tomaszewski asked whether it is always true that at least half of these sums satisfy $|S| \le 1$.  In 2020, Nathan Keller and Ohad Klein proved that the answer is yes.  In this talk, we will discuss some of the tools used to solve this problem.

16:35 to 17:00 Aravind Srinivasan (University of Maryland, Maryland, USA) Tail bounds for read-k families
17:15 to 18:15 Avi Wigderson (IAS) Imitation Games

One of Alan Turing's most influential papers is his 1950 Computing machinery and intelligence, in which he introduces the famous "Turing test" for probing the nature of intelligence by evaluating the abilities of machines to behave as humans. In this test, which he calls the "Imitation Game," a (human) referee has to distinguish between two (remote and separate) entities, a human and a computer, only by observing answers to a sequence of arbitrary questions to each entity. This lecture will exposit, through examples from a surprisingly diverse array of settings, the remarkable power of this basic idea to understand many other concepts. I will discuss variations of the Imitation Game in which we change the nature of the referee, and of the objects to be distinguished, to yield different analogs of the Turing test. These new Imitation Games lead to novel, precise, and operative definitions of classical notions, including secret, knowledge, privacy, randomness, proof, fairness, and others. These definitions have in turn led to numerous results, applications, and understanding. Some, among many consequences of this fundamental paradigm, are the foundations of cryptography, the surprising discoveries on the power and limits of randomness, the recent influential notion of differential privacy, and breakthrough results on patterns in the prime numbers and navigation in networks. Central to each of these settings are computational and information theoretic limitations placed on the referee in the relevant Imitation Game. This lecture will survey some of these developments. It assumes no specific background knowledge.

Friday, 09 May 2025
Time Speaker Title Resources
09:05 to 09:30 Manindra Agrawal (Indian Institute of Technology, Kanpur, India) TBD
09:30 to 09:55 Naveen Garg (Indian Institute of Technology, Delhi, India) Bourgain's embedding revisited

In this talk I will give an alternate proof for Bourgain's theorem for metric embeddings. The proof is combinatorial and achieves a sharper bound on the distortion.

09:55 to 10:20 Kavitha Telikepalli (Tata Institute of Fundamental Research, Mumbai, India) Pseudo-popular matchings

Stable matchings are a well-studied class of matchings in bipartite graphs where vertices have preferences over their neighbors. Stability is a rather strict notion and popularity is a natural relaxation of stability. However, unlike the stable matching polytope, the popular matching polytope has near-exponential extension complexity and it is NP-hard to find a min-cost popular matching when edges have costs. This talk will be on a relaxation of popularity called pseudo-popularity. The pseudo-popular matching polytope has a compact description; nevertheless, it is coNP-hard to find a min-cost pseudo-popular matching. We will see an interesting subclass of pseudo-popular matchings (that contains all popular matchings) whose polytope has a compact extended formulation and the min-cost such matching can be efficiently computed.

10:20 to 10:45 Venkat Guruswami (University of California, Berkeley, USA) Redundancy is all you need (thanks to entropy)

As we know, Jaikumar is a master at wielding entropy in the most elegant and surprising ways. In honor of Jaikumar (and entropy), I will describe a recent result with Josh Brakensiek showing that every constraint satisfaction problem (CSP) can be sparsified down to (within polylog factors of) the size of a maximum non-redundant instance of that CSP. A non-redundant instance of a CSP admits, for each constraint, an assignment satisfying only that constraint, making such instances obvious barriers for sparsification (e.g., for cut sparsification in graphs, spanning trees are non-redundant instances).

Our sparsification theorem is established in the very general context of set families. A key technical ingredient is an application of the beautiful entropic inequality underlying Gilmer's recent breakthrough on the union-closed sets conjecture.

As a consequence of our main theorem, which precisely ties the sparsifiability of a CSP to its non-redundancy (NRD), a number of results in the NRD literature immediately extend to CSP sparsification. We also contribute new results towards understanding the rich landscape of NRD of CSP predicates. For example, in recent work with Brakensiek, Jansen, Lagerkvist and Wahlstrom, we demonstrate for every rational r \ge 1, an example CSP with NRD growing as n^r. The upper bound is proved using Shearer's lemma.

11:15 to 11:40 Arvind Vikraman (Chennai Mathematical Institute, Siruseri, India) TBD
11:40 to 12:05 Prerona Chatterjee (National Institute of Science Education and Research, Bhubaneswar, India) TBD
12:05 to 12:30 K V Subrahmanyam (Chennai Mathematical Institute, Siruseri, India) Stabilizer limits and Orbit Closures in Geometric Complexity Theory

The problem of understanding which polynomials arise as limits of the determinant polynomial is important in algebraic complexity theory. I will describe recent work with Bharat Adsul and Milind Sohoni on how stabilizers of homogeneous polynomials change when taking limits under the action of a one parameter subgroup. I will briefly describe other structures which arise naturally that could help understand the passage from a polynomial to the limit polynomial it picks up under the action of a one parameter subgroup.
 

14:00 to 14:25 Ashwin Nayak (University of Waterloo, Waterloo, Canada) TBD
14:25 to 14:50 Pranab Sen (Tata Institute of Fundamental Research, Mumbai, India) TBD
14:50 to 15:15 Rahul Jain (National University of Singapore) Exploring the power of rejection sampling with Jaikumar

In this talk we review some applications of the powerful idea of rejection sampling in source-coding and beyond. We start with the classical case, move to the classical-quantum case and then to the (fully) quantum case.

15:45 to 16:10 Arkadev Chattopadhyay (Tata Institute of Fundamental Research, Mumbai, India) TBD
16:35 to 17:00 Parikshit Gopalan (Apple, USA) TBD